Описание
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
Релиз | Статус | Примечание |
---|---|---|
artful | DNE | |
bionic | DNE | |
devel | DNE | |
esm-apps/xenial | not-affected | 6.0.45+dfsg-1 |
esm-infra-legacy/trusty | not-affected | 6.0.39-1ubuntu0.1 |
precise | released | 6.0.35-1ubuntu3.7 |
precise/esm | not-affected | 6.0.35-1ubuntu3.7 |
trusty | released | 6.0.39-1ubuntu0.1 |
trusty/esm | not-affected | 6.0.39-1ubuntu0.1 |
upstream | released | 6.0.45 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
artful | not-affected | 7.0.68-1 |
bionic | not-affected | 7.0.68-1 |
devel | not-affected | 7.0.68-1 |
esm-apps/bionic | not-affected | 7.0.68-1 |
esm-apps/xenial | not-affected | 7.0.68-1 |
esm-infra-legacy/trusty | not-affected | 7.0.52-1ubuntu0.6 |
precise | ignored | end of life |
precise/esm | DNE | precise was needed |
trusty | released | 7.0.52-1ubuntu0.6 |
trusty/esm | not-affected | 7.0.52-1ubuntu0.6 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
artful | not-affected | 8.0.32-1ubuntu1 |
bionic | not-affected | 8.0.32-1ubuntu1 |
devel | not-affected | 8.0.32-1ubuntu1 |
esm-apps/bionic | not-affected | 8.0.32-1ubuntu1 |
esm-infra-legacy/trusty | DNE | |
esm-infra/xenial | not-affected | 8.0.32-1ubuntu1 |
precise | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE |
Показывать по
EPSS
4 Medium
CVSS2
4.3 Medium
CVSS3
Связанные уязвимости
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat ...
Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat
Уязвимость сервера приложений Apache Tomcat, позволяющая нарушителю обойти ограничения проверки подлинности
EPSS
4 Medium
CVSS2
4.3 Medium
CVSS3